Unbreakable Phantom PGP Encryption
What is PGP?
PGP is data encryption software that is used for encrypting and decrypting digital documents and messages.
Phil Zimmermann created PGP in 1991 while working at PKWARE Inc. Zimmermann created PGP encryption so that like-minded people could communicate securely without invasion of privacy.
In February of 1993, shortly after releasing PGP to the world, Zimmermann became the target of an investigation by the US Government for "munitions export without a license" because encryption systems using keys larger than 40 bits were then considered munitions at that time.
After several years, the investigation was closed without filing any charges against Zimmerman or anyone else.
Since then PGP has been utilized worldwide by both private and public sector organizations to encrypt sensitive communications.
Learn more about how PGP works.
How strong is PGP?
The real strength of PGP is found in its keys, which are measured in bits. Phantom Secure PGP encryption utilizes keys that are 4096-bit.
This means that each Phantom Secure key is a combination of numbers, letters, and symbols. Each randomly generated key combination is one of 2^4096 possibilities. This number has to be expressed as 2 to the exponent 4096 because the actual number representing the full range of possible combinations is more than 1,200 digits long. Finding a matching combination in this pool of possibilities is impossible.
It is difficult for the common person to grasp how this seemingly intangible number relates to the practical strength of encryption. The proof lies in the simple fact that no single person or combination of people and super computers (including the world’s leading intelligence agencies) has ever been able to find the keys to decrypt data encrypted with 4096-bit PGP. It is simply unbreakable.
Why use PGP?
PGP encryption technology provides the highest level of communication security available today. Fortune 500 companies, banks, law firms, and even the White House trust encrypted Blackberries to keep them secure.
The United States' President, Barack Obama told an interviewer that as much as he loves the iPhone, the secret service won’t let him use it because they can't secure it like they can a BlackBerry.
An International Business Times article written in April 2016 said:
"White House aides use iPhones, but President Obama himself has no say in what smartphone he can use. Instead of an iPhone or an Android device, he must use a modified BlackBerry, for security purposes. The National Security Agency was responsible for first setting up Obama's BlackBerry when he was president-elect in 2008. The phone was stripped of most of its functionality to make way for extra layers of encryption."
Read the full article here: President Barack Obama Not Allowed To Use An iPhone, Relies On BlackBerry In 2016
Why use AES, ECC, and the Double Ratchet Algorithm?
AES 256 has been the most scrutinized symmetric encryption algorithm in the world. It has been highly reviewed and updated over the years to be secure, fast and hardware accelerated.
ECC stands for Elliptical Curve Cryptography, and ECC 25519 has a higher effective bit strength than OTR’s 1536-bit DH key. In fact, ECC 25519 Is the most trusted ECC Curve.
The Double Ratchet Algorithm is another added layer of security with many desirable properties including 1) creating a new key with every message, 2) the ability to protect past messages even if the key is compromised, 3) allowing two parties to verify each other while staying hidden from any prying third parties, and more!